CN104081408A - System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner - Google Patents

System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner Download PDF

Info

Publication number
CN104081408A
CN104081408A CN201280065633.XA CN201280065633A CN104081408A CN 104081408 A CN104081408 A CN 104081408A CN 201280065633 A CN201280065633 A CN 201280065633A CN 104081408 A CN104081408 A CN 104081408A
Authority
CN
China
Prior art keywords
electronic installation
application program
described electronic
computer based
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201280065633.XA
Other languages
Chinese (zh)
Inventor
道格拉斯·布里顿
安德鲁·迈克尔·韦斯耶
布莱恩·塞约恩·帕克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kaprica Security Inc
Original Assignee
Kaprica Security Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/361,153 external-priority patent/US8584243B2/en
Application filed by Kaprica Security Inc filed Critical Kaprica Security Inc
Publication of CN104081408A publication Critical patent/CN104081408A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.

Description

For the application program downloading and the system and method that comprises safety charger and scan for malware instrument of the two-way trust between mobile device
Related application
The application requires the U.S. Patent application 13/361 that the U.S. Patent application 13/429811 that the title of submission on March 26th, 2012 is " System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including A Secure Charger and Malware Scanner " and the title of submitting on January 30th, 2012 are " System And Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner ", 153 right of priority, it requires the rights and interests of following application according to 35U.S.C. § 119 (e): the U.S. Provisional Patent Application sequence number 61/557 that on November 9th, 2011 submits to, 699, the U.S. Provisional Patent Application sequence number 61/567 that on Dec 6th, 2011 submits to, the U.S. Provisional Patent Application sequence number 61/570 that on Dec 14th, 320 and 2011 submits to, 585, the whole all modes by reference of all these applications are incorporated to herein clearly.
Technical field
The present invention relates to for following system and method: the application program that makes mobile device can trust download is application program believable, that make to download scan for malware and other virus when can trust the authorized down load application program of its mobile device being downloaded to and make mobile device charging and charge to mobile device.
Background technology
Modern intelligent communications device, such as cell phone, personal digital assistant (" PDA "), the board device (being referred to as below " intelligent movable device ") of mobile-payment system, mobile health-care system, hand-held enforcement system or other type of (trade mark of apple (limited) company), smart phone, for example point of sales system (wired and wireless), allow user to carry out the business transaction of gamut, this requires user that required authentication authority is inputed in device.In addition, can on these devices, repeat and for good and all store and modification company and personal data.Some tissues allow the whole company of the mobile device users remote access file structure of authorizing.
Intelligent movable device is used by the ever-increasing children of quantity and a few peoples.When using legally, these intelligent movable devices can help the schedule of family's communication and complex management.Like this, intelligent movable device provides important safety chain so that they can make a phone call to family in emergency condition etc. for children.
Some nearest intelligent movable devices provide the almost access of unconfined various interesting and/or developmental game for children and adult.For children, there is the very actual risk with have good grounds relevant to intelligent movable device, because children can and cause other people of risk to utilize by possible predator.These risks are accessed unaccommodated content of age including but not limited to giving children, and are more jeopardously by game and social networking service, this means and lure them that personal data are provided or enter unaccommodated communication.The unconfined source of the simplicity of set up applications, application program and supply and the assurance reliability of application program or the difficulty of legitimacy make it may advocate assertorically that hardly children can use their intelligent movable device safely.
When intelligent movable device down load application program, intelligent movable device is trusted the virus that market verifying application programs does not comprise Malware or other type.Yet the pseudo-version of application program, such as application program " Angry " the pseudo-version of (trade mark of Rovio Mobile Oy Corporation),, in failure aspect this.Like this, if malware author is set up the pseudo-group of application program, its all virus that all comprises Malware or other type, the damage of the device that comprises intelligent movable device being downloaded to for it may be great.
In addition the developer and the publisher that, are downloaded to the application program of intelligent movable device expect that the device that its application program is downloaded to is the intelligent movable device of authorizing.If not, so to assailant offer an opportunity the intelligent movable device of pretending to be mandate with the access that obtains wrongly Downloadable application program for undelegated object.
The concrete risk of intelligent movable device has good grounds and continues and increases.Mobile " Botnet ", the Malware moving on intelligent movable device, promotes these devices to participate in unlawful activities, such as stealing data and by mistake participating in concerted attack, it at least started to exist since 2009.For Android tM(trade mark of company of Google's (limited)), Windows (trade mark of Microsoft) and the utilization (exploits) of (trade mark of apple (limited) company) is regularly published.For object of the present invention, " utilization " is (exploit) software, data block or command sequence, and it utilizes fault, mistake or leak so that undesirable or unforeseeable behavior occurs in computer software, hardware or electrical type (conventionally computerized).Utilization is including but not limited to promoting the action things of (such as obtaining the control of computer system or allowing privilege upgrading or Denial of Service attack)
The industry of intelligent movable device has trended towards the impaired aspect reflection desktop computer industry about mobile security device.In this case, it can be impaired that intelligent movable device users is understood its device, and in this connection, how they want to know that when impaired pick-up unit is and how significantly to reduce impaired risk.
Along with the confidential data of storing on the intelligent movable device in increase and the appearance of information, exist assailant to find access that secret obtains these devices to obtain the larger risk of this information and data.
Existence attempts to overcome the company of some security risks mentioned above.Yi Ge company, Lookout, Inc., has represented that it is developing the virus scan application program of mobile device of the scanning based on signature (signature-based).Yet the verified scan method based on signature in PC market is useless.The method has two basic problems.
First problem is that the scan method based on signature depends on the software interface of application program and receives the operating system (" OS ") about the information of the data on computing machine.Yet the dependence of known these types can make application protection useless.This is because if attacker is complicated, and such as so-called " concealment formula " (root-kit) those, they can destroy OS itself and " deception " virus scan instrument when the request of virus scan instrument may corrupted information then.
The Second Problem of the scan method based on signature is that its ciphering signature that depends on known pernicious code is to determine the virus of statement.The obvious problem of the method is that system cannot be found or isolate and is not also identified as pernicious pernicious code.Like this, generally believe that malware detection based on signature can not continue the state having kept along with the exploitation of Malware, utilization and emerging vector of attack.
Another company, Fixmo, Inc., has adopted the software approach with desktop computer product form, and it for example impinges upon soon on the mobile device of (trade mark of Reserch in Motion Limited), store, and by itself and previous snapshot comparison.Yet the method is not portable (movement), that be inconvenience and is not designed for mass marketing.
From for example AT & T is wireless and the visual angle of the operator that Verizon is wireless, the problem above discussed and risk improve the real economy cost of customer support.Manpower on retail shop and line is spent to help client to get rid of the fault of its intelligent movable device man-hour.Along with intelligent movable device becomes " more intelligent " and more complicated, its possible mode going wrong will be more.At present, for operator, fix a breakdown be labor intensive, do not produce extra sales volume and take the time that employee sells.
At present, there is not the Malware of scanning intelligent movable device and the simple and efficient mode of other virus.Usual way is that intelligent movable device is connected to on knee or desk-top computer to carry out this type of scanning.In addition, these scannings must have computer user's active to participate in carrying out.
Conventionally, when just charging to intelligent movable device, can operative installations with respect to its user this dead time normally because described intelligent movable device ties to socket or computing machine by charging electric wire.In addition,, when using charging pad to charge to intelligent movable device, they almost can not use completely.This is that many people know while not needing to use these devices the reason to these device chargings at night or at them.Can more effectively use the duration of charging and to carrying out Malware in intelligent movable device charging and virus scan will be very favorable.
Need a kind of system and method, its make between intelligent movable device that the application program downloaded and these application programs download to can two-way trust to make intelligent movable device can trust under institute application program be application program believable and that download can trust intelligent movable device be authorized to download they.Also need a kind of cheap mobile device, it can be for charging to intelligent movable device and scan and be identified in Malware and other virus on mobile device in charging.
Summary of the invention
The present invention relates to a kind of system and method, it will make user's intelligent movable device, and the application program that can trust download such as the board device of mobile-payment system, mobile health-care system, hand-held enforcement system or other type of cell phone, PDA, iPad, smart phone, for example point of sales system (wired and wireless) is that application program believable and that download can be trusted the authorized down load application of intelligent movable device that they are downloaded to.System and method of the present invention is partly by realizing and scan in charging application program and the Malware in OS and other virus on intelligent movable device to the safety charger of intelligent movable device charging.Thereby this contribute to get rid of intelligent movable device fault its by normal running.
The reliability that system and method for the present invention has downloaded to the application program of intelligent movable device by checking is used and infects them to prevent pseudo-application program on mobile device.According to the present invention, when safety charger scan for malware or other type viral, it will access have downloaded to all application programs of intelligent movable device.For the mobile device operating on based on Android (Android) system, mean the application package (" APK ") that the present invention will each application program of access.Because each in application program is signed, so intelligent movable device can be made hypothesis about the identity of the entity of release application program.The present invention uses this Information Authentication signature not only effectively but also corresponding to suitable application program publisher, described publisher allows the checking of application reliability.
System and method of the present invention is set up system database, identifying information and the suitable application program publisher of application program.This information is stored in can pass through the remote location of remote system server access.Preferably, application program publisher has cooperation foundation and the formation of this system database of publisher's information with promotion.System database also will form by application program popular in market, and system manager can verify publisher's information and is increased to database.
Conventionally, pseudo-application program does not have the suitable publisher's information being associated with them.Along with the foundation of the system database above discussed, when needs are verified the application program of downloading, safety charger will send application information to remote system server.Remote system server be connected to system database and server by the author with suitable/public keys of publisher responds safety charger to carry out proof procedure.Safety charger will be preserved public keys, and described public keys makes safety charger itself can carry out checking following.
System and method permission application program of the present invention is trusted the authorized application program of downloading that receives of intelligent movable device that they are downloaded to.Conventionally, when intelligent movable device is used the application program that can access by remote service, application author/publisher and provide the service of application program to have to suppose that intelligent movable device is safe, it is the authorized device that receives the application program of downloading; Yet, cannot accomplish this point at present.
System and a method according to the invention, application author/publisher is safe with providing application program can be connected to remote location for the attendant who downloads with checking intelligent movable device.Remote server reporting scanning result to remote location when this scans each time by safety charger completes.Scanning result is designated as the state of intelligent movable device impaired or not impaired.Remote system server will be stored this information for record and report, and notification application author/publisher and attendant's intelligent movable device safety whether.
The present invention provides powerful ability for serving writer, because the ability that the present invention serves writer's safety assurance and restriction assailant pretends to be intelligent movable device.Although assailant can attempt to pretend to be intelligent movable device with the defence of test remote system server, embodiments of the present invention determine by service can be checked whether assailant is the intelligent movable device of authorizing.If not, intelligent movable device will be considered " impaired " and not be intelligent movable device trusty.Once determine that intelligent movable device is " impaired " (or " not scanning recently "), application author/publisher and/or service just will be refused the access of application programs or take other punitive measures, such as give a warning, impose a fine or the measure of other type to provide the notice of access denied.
For object of the present invention, " service " be " network service " (" web service ") preferably.Network service is the application program being present in such as in the distributional environment of the Internet.Network service is the communication between two electronic installations on the Internet by impact.Network service is by reception request, based on asking execution function and returning to reply.Request and reply can be used agreement, such as HTTP.
For object of the present invention, " serving writer " is to provide company or the individual of network service.
Safety charger according to the present invention comprises intelligent movable device charging cable and will carry out the embedding soft copy of its evidence obtaining and behavioural analysis in to the charging of intelligent movable device.Like this, system and method for the present invention can be observed malicious act, Malware, the modification of intelligent movable device OS will be communicated by letter with undesirable device.Safety charger is by the abnormal patterns of recognition device communication activity, and the personal data on stealing or redirection device are attempted in its expression.
System of the present invention resides in mutual with intelligent movable device that the outside of intelligent movable device can be considerably less.Like this, Malware can not " be cheated " system of the present invention.
Also can be by independent realizing without line scanning device with respect to the scan function described in safety charger.Wireless device will comprise hardware component and software part.Radio hardware parts can be used radio frequency (" RF ") to connect, and it connects including but not limited to 802.11x or bluetooth.Hardware component can be the form of 802.11x WAP (" WAP ") or Bluetooth adapter.
The software part that is positioned at intelligent movable device scans with execution analysis and operation as the agency of the hardware unit of authentication.Certificate and software part that authentication is presented signature by hardware component are realized certifying signature.
System and method of the present invention provides a kind of member, can trust the application program of download by described member intelligent movable device.
System and method of the present invention provides a kind of member, and the application program of downloading by described member can be trusted the authorized down load application program of its moving intelligent apparatus being downloaded to.
System and method of the present invention provides a kind of member, by described member single assembly, can and can in the charging of intelligent movable device, scan Malware or other virus of intelligent movable device to the charging of intelligent movable device.
System and method of the present invention also provides a kind of member, and the scanister independent by described member can be for wirelessly scanning Malware and other virus of mobile device.
System and method of the present invention will be described in greater detail with reference to the attached drawings in the following description book.
Accompanying drawing explanation
Fig. 1 illustrates the schematic diagram of system of the present invention, and described system is for realizing the two-way trust between intelligent movable device and the application program of download.
Fig. 2 illustrates the schematic diagram that the security socket layer shown in Fig. 1 (" SSL ") connects.
Fig. 3 illustrates for determining the schematic flow diagram of the intelligent movable device the trust whether application program of download can be downloaded to by it.
It is the schematic flow diagram of authorized intelligent movable device that Fig. 4 illustrates for determining whether the application program of downloading can trust its intelligent movable device being downloaded to.
Fig. 5 A and Fig. 5 B illustrate respectively outboard profile and the front view (FV) of the first embodiment of safety charger, and described safety charger is connected to intelligent movable device for to device charging and carry out application program on intelligent movable device and Malware and other virus scan of OS.
Fig. 6 A and Fig. 6 B illustrate respectively outboard profile and the front view (FV) of the second embodiment of safety charger, and described safety charger is connected to intelligent movable device for to device charging and carry out application program on intelligent movable device and Malware and other virus scan of OS.
Fig. 7 illustrates the diagrammatic top view of the representative embodiments of device, and described device is for wirelessly carrying out application program on intelligent movable device and Malware and other virus scan of OS.
Fig. 8 illustrates the schematic flow diagram that carries out Malware and other virus scan on the indication device for the system such as based on blackberry, blueberry (Blackberry) and the system based on Android.
Fig. 9 illustrates for carrying out the schematic flow diagram of whole Malwares and other virus scan in the system based on blackberry, blueberry.
Figure 10 illustrates for carrying out the schematic flow diagram of quick Malware and other virus scan in the system based on Android.
Figure 11 illustrates for carrying out the schematic flow diagram of whole Malwares and other virus scan in the system based on Android.
Figure 12 illustrates the schematic flow diagram of " submission result " that the Malware that carries out on the indication device for the treatment of the system with such as based on blackberry, blueberry and the system based on Android and other virus scan be associated.
Embodiment
The present invention relates to a kind of system and method, it will make intelligent movable device, such as the board device of mobile-payment system, mobile health-care system, hand-held enforcement system or other type of cell phone, PDA, iPad, smart phone, for example point of sales system (wired and wireless), can trust the application program of download and the application program of download can be trusted the intelligent movable device that they are downloaded to.System and method of the present invention is partly by realizing and carry out in charging evidence obtaining and the behavioural analysis of intelligent movable device to the safety charger of intelligent movable device charging.Thereby this contribute to get rid of intelligent movable device fault its by normal running.Performed evidence obtaining and behavioural analysis including but not limited to scanning to be identified in malicious act within intelligent movable device, Malware within intelligent movable device, the modification of intelligent movable device OS communicated by letter with undesirable device.
Fig. 1, always represents with 100, and the schematic diagram of system of the present invention is shown, and described system is for realizing the two-way trust between intelligent movable device and the application program of download.Fig. 1 also shows safety charger and Malware/virus scan instrument (hereinafter referred to as " safety charger "), and it is except charging to intelligent movable device and carrying out Malware and virus scan partly for realizing the two-way trust between intelligent movable device and the application program of download.Now will the total system shown in Fig. 1 always be described.
Internal network 102 is telecommunication networks, and safety charger 124 is by comprising that the SSL of intelligent movable device 128 connects 126 and is connected to described telecommunication network.Internal network 102 comprises backend network servers pond 104 (hereinafter referred to as " back-end server 104 "), software upgrading mechanism 114, customer database 108, intelligent movable mounted cast database 110 (" MSD database 110 "), scan database 112, certificate verification authority server 116 for renewal being provided to safety charger 124, and front-end web servers pond (hereinafter referred to as " front-end server 106 ").Client 122 is connected to front-end server 106 via the authentication mechanism 120 of routine operation.Herein back-end server 104 and front-end server 106 are called jointly " remote server " and still within the scope of the present invention.In addition, the functional combination of back-end server 104 and front end 106 servers can be become individual server and its will be within the scope of the present invention.Now Fig. 1 will be described in more detail.
Safety charger 124 is used the Internet connection of intelligent movable device 128 to be connected to the back-end server 104 of internal network 102, describes Malware and the viral method of the internal part about described safety charger 124 and scanning intelligent movable device thereof in detail described safety charger 124 subsequently.This communication link is used for safety charger 124 to baseline and the setting of internal network 102 reporting scanning results and inquiry internal network 102 and receives software upgrading and out of Memory from internal network 102.
Safety charger 124 is to the result of internal network 102 report Malwares and virus scan.Preferably, these scannings will comprise non-dedicated analysis data or statistics and analysis, such as relating to the version of operating system, application program of installation, operator etc.When not having for the baseline of this intelligent movable device or the baseline of intelligent movable device, safety charger 124 scanning intelligent movable devices 128 and safety charger do not change, for example, during the software upgrading of intelligent movable device, the new baseline that safety charger 124 will inquiry back-end server 104 and will be from MSD database 110 these baselines of retrieval.To describe subsequently safety charger and use baseline in scanning mobile device.
Preferably, internal network 102 comprises three databases.These are customer database 108, MSD database 110 and scan database 112.Customer database 108 is for storing customer information.The associated specific intelligent movable device of this customer information and particular system user.Customer database 108 also arranges for storing client, such as (i) if client wish when receiving new scanning result by mail reminder or (ii) client's risk profile.
Storage information on all intelligent movable devices that MSD database 110 is supported at internal network 102.Each intelligent movable device storing software version, baseline and various analytical information that MSD database 110 is its support, for example, recover reflection.Safety charger 124 from MSD data base querying information to carry out scanning analysis.Should be understood that and can have one or more intelligent movable mounted casts of being supported by internal network 102 and still within the scope of the present invention.
Scan database 112 is for storing the scanning result receiving from safety charger 124.These results including but not limited to intelligent movable device whether be " impaired " (mean it and comprise Malware or virus), the list of application program on intelligent movable device, file on intelligent movable device and the list of hash information (hashes) be, the type of the data of scanning and time and scanning.Scan database 112 is also stored the information that relates to the application program on intelligent movable device.This information is including but not limited to application author/publisher information and the IMEI information that relates to intelligent movable device 128, as explained in detail subsequently.
When there is the renewal that is used for safety charger 124, they are connected 126 communications with SSL via back-end server 104 from software upgrading mechanism 114 to safety charger 124.Communication in SSL connects 126 is affected by the Internet connection of intelligent movable device 128.
SSL connects 126 for guaranteeing the validity of the communication from safety charger 124 to internal network 102.Each safety charger has client certificate/key Dui He certificate verification mechanism certificate of the secure communication affecting between safety charger 124 and internal network 102.Therefore,, when safety charger 124 is used the Internet connection of intelligent movable device 128 to communicate by letter with back-end server 104, certificate information is sent to back-end server 104.Back-end server 104 has from the copy of the predetermined certificate verification mechanism certificate of certificate verification authority server 116 is signed by the certificate verification mechanism private key of being scheduled to for verifying from the certificate information of safety charger 124.If correctly signature, communicates by letter effectively and acts on through internal network 102.
For example, client 122 is other infotech of business and government level (" IT ") keeper, retail consumers and client of operator service representative.For client 122 is communicated by letter with internal network 102, they must have correct license to access internal networks 102 by authentication mechanism 120.In addition, application program publisher communicates by letter with internal network 102 with front-end server 106 by authentication mechanism 120 with author, and this describes in detail about Fig. 3 and Fig. 4 subsequently.
With reference to figure 2, always with 200, represent, illustrate in greater detail SSL and connect 126.As shown, safety charger 124 is connected to intelligent movable device 128, and it is that SSL connects 126 part for being connected to the object (referring to Fig. 1) of internal network 102.Intelligent movable device 128 is connected to Internet 2 02 by Wi-Fi network 204 or cellular network 206.The form that connects 126 communications from safety charger 124 to remote server 208 by SSL is preferably by the JSON (" java script object symbol ") of HTTP.As shown, database 210 is connected to remote server 208.Data base set shown in database 210 presentation graphs 1, i.e. customer database 108, MSD database 110 and scan database 112.In addition, apps server 212 is processed request and based on request, is carried out the measure of any necessity, for example, to keeper, send Email, and preferably, the functional of apps server 212 is the part of the webserver 208.
Because the two-way trust of understanding completely between intelligent movable device and the application program of download must be understood safety charger 124, so will discuss in detail safety charger 124 before the two-way trust between the application program of discussing intelligent movable device 124 and downloading.
Fig. 5 A and Fig. 5 B illustrate respectively for being connected to outboard profile and the front view (FV) of the first embodiment of the safety charger of intelligent movable device.Safety charger has the ability of carrying out the application program of intelligent movable device and the Malware of OS and other virus scan in to device charging.
With reference to figure 5A, always with 500, represent, illustrate according to the outboard profile of the inside of the exposure of safety charger of the present invention.In Fig. 5 A, electricity fork part 502 is shown for connecting safety charger to wall plug receptacle.Yet, should be understood that fork part may replace by connecting safety charger other member to power supply.For example, safety charger 500 may have having in end for being connected to the USB of power supply or the cable of USB2 plug from its extension.These and other method of attachment is contained by the present invention, and therefore within the scope of the present invention.
Refer again to Fig. 5 A, is for AC power transfer being become to the power transformer 506 of DC power within the housing 504 of safety charger 500.Safety charger 500 also comprises CPU508, random access storage device (" RAM ") 510 and secure digital (" SD ") card 512.CPU508 is for controlling all operations of safety charger 500.RAM510 is as system storage and storage running program code and data, and volatibility system file, for example daily record.SD card 512 is for storing the database on OS, Safety analysis code and device.Safety analysis code is including but not limited to being included in safety charger 500 or the software program that can download from internal network 102, and it carries out the various analyses of intelligent movable device as described herein.Should be understood that can increase extra Safety analysis code and it will be still within the scope of the present invention.
The cable 518 extending from housing 504 has connector for being connected to intelligent movable device in end.Just by this cable: (1) carries out charging and (2) carry out the scanning of intelligent movable device and information are sent to and are received from back-end server 104.
With reference to figure 5B, it illustrates the front view (FV) of the housing 504 of (" LED ") 514 that have red light emitting diodes and green LED 516.When being illuminated, red LED 514 can be indicated the scanning result of application program on intelligent movable device or OS or device is shown is " impaired ".When green LED 516 is illuminated, it can be indicated the scanning result of application program on intelligent movable device or OS or device is shown is " int ".The use of pilot lamp will be described in detail subsequently.
Preferably, safety charger 500 comprises that one or more status lamps are used to indicate the state of intelligent movable device: charging and scanning.For example, safety charger 500 can have the LED of redness or flicker when intelligent movable device charges, once charge, illuminates respectively green LED or stable red LED.Safety charger 500 also can have red LED with beacon scanning state and result.For example, if carrying out scanning with beacon scanning, red LED sparkling determines that intelligent movable device is " impaired ", and if to change into stable scanning indication intelligent movable device be safe or " int " or intelligent movable device are closed or illuminate green LED from safety charger 500 disconnections.These are only also being contained and thinking within the scope of the present invention of some possibilities and other.
Fig. 6 A and Fig. 6 B illustrate respectively for being connected to outboard profile and the front view (FV) of the second embodiment of the safety charger of intelligent movable device.Safety charger has to carrying out the Malware of application program and OS and the ability of other virus scan in device charging.
With reference to figure 6A, always with 600, represent, the outboard profile of inside of the exposure of safety charger is shown.In Fig. 6 A, electricity fork part 602 is shown for being connected to wall plug receptacle.Yet, should be understood that fork part may be replaced by other member that is connected to power supply.For example, safety charger 600 may have having in end for being connected to the USB of power supply or the cable of USB2 plug from its extension.These and other method of attachment is contained by the present invention, and they within the scope of the present invention.
With reference to figure 6A, is for AC power transfer being become to the power transformer 606 of DC power within the housing 604 of safety charger 600.Safety charger 600 also comprises CPU608, RAM610 and SD card 612.CPU608 is for controlling all operations of safety charger 600.RAM610 is as system storage and storage running program code and data, and volatibility system file, for example daily record.SD card 612 is for storing the database on OS, Safety analysis code and device.Safety analysis code comprises those of setting forth as the SD card 512 with respect in Fig. 5.
The cable 614 extending from housing 604 has connector for being connected to intelligent movable device in end.Just by this cable: (1) carries out charging and (2) carry out the scanning of intelligent movable device and information are sent to and are received from back-end server 104.
With reference to figure 6B, it illustrates the front view (FV) of the housing 604 that shows liquid crystal display (" LCD ") 616.LCD616 will illustrate scanning result, and its application program or OS that is included on intelligent movable device is " impaired " or " int ".
With reference to figure 7, always with 700, represent, illustrate for being wirelessly connected to the exposure vertical view of representative embodiments of the scanister of intelligent movable device.This is wireless embodiment can be for carrying out application program on intelligent movable device and Malware and other virus scan of OS again.Is battery 704, CPU 706, RAM 708 and SD card 710 within housing 702.Also show green LED 712 and red LED 714 is used to indicate scanning mode and/or scanning result.
Battery 704 is for being connected to scanister 700 power supplies of the scanister of wall plug receptacle to replacement.Yet, also can consider can use USB port 718 to be connected to external power source without line scanning device 700.In addition, consider that battery 704 is rechargeable batteries.Like this, rechargeable battery can be by USB port 718 with any charging the in many conventional methods, and source comprise use USB port 718 from computing machine to scanner device battery recharge.
CPU, RAM and SD card are carried out as for Fig. 5 A and substantially the same function as described in the embodiment shown in Fig. 5 B.Like this, those are described and are incorporated to by reference herein.This is wireless embodiment also comprises transceiver 716 for the two-way communication of intelligent movable device 128 (Fig. 1) to scan, and for using the two-way communication of Internet connection and the internal network 102 of intelligent movable device 128 (Fig. 1).Should be understood that scanister 700 can use the method except green LED 712 and red LED 714 to come beacon scanning state and scanning result, and it will be still within the scope of the present invention.
Wireless scanner device, such as in Fig. 7 with shown in 700, preferably include and will use 802.11x or blue teeth wireless to be connected to the scanner device of intelligent movable device 128 (Fig. 1).According to the embodiment of wireless RF communication method, comprise 802.11x WAP (" WAP ") and Bluetooth adapter.According to 802.11x embodiment, intelligent movable device is connected to WAP and then uses its hope of TCP/IP notice WAP to be scanned.Preferably, WAP embodiment provides channel, and WAP can move local command, download file on intelligent movable device 128 on described channel, restart and recover and carry out other analysis.Because WAP will have the Internet connection of himself, thus it by this connectivity of use to be connected to internal network 102 rather than to connect by intelligent movable device 128.
Bluetooth embodiment is preferably the form of Bluetooth adapter, described bluetooth embodiment the feature identical with WAP is provided but for example, with portable form factor (on key chain).It need to be scanned intelligent movable device 128 and adapter pairing and notice adapter.According to bluetooth embodiment, intelligent movable device provides the control channel with WAP embodiment same type; Yet bluetooth embodiment will be used the Internet connection of intelligent movable device 128 to be connected to internal network 102.For power, bluetooth embodiment comprises battery and/or can be connected to external power source, for example, insert wall plug receptacle or be connected to laptop computer via USB.
With reference to figure 5A, Fig. 5 B, Fig. 6 A, Fig. 6 B and Fig. 7, the function element of safety charger 124 can be incorporated to another device that intelligent movable device 128 can be connected to and it will be still within the scope of the present invention.For example, the function element of safety charger 124 can be incorporated to Docking station.According to this configuration, when intelligent movable device is connected to Docking station with charging, it also will be scanned Malware or other virus.In the time of in the function element of safety charger 124 is configured in such as the device of Docking station, still carry out all operations feature as herein described at the safety charger shown in Fig. 5 A, Fig. 5 B, Fig. 6 A, Fig. 6 B and Fig. 7.
Refer again to Fig. 1, as prior statement, safety charger 124 is preferably realized in comprising the hardware unit of function software, described function software is used for two objects: (1) gives the intelligent movable device connecting 128 chargings, and the integrality of the intelligent movable device 128 of (2) checking connection, this comprises for example verifies that intelligent movable device does not comprise " concealment formula " (it is a kind of form of Malware), checks pseudo-application program and finds excessive risk application program.
When safety charger 124 is connected to intelligent movable device 128, it will carry out a series of scanning.The scanning of two kinds of main Types is " full scan " and " rapid scanning." once intelligent movable device 128 is connected to safety charger 124, just operation of rapid scanning (it will described in detail subsequently).Preferably, rapid scanning will take about 60 seconds and move.Full scan (it also will described in detail subsequently) operation after rapid scanning has moved about hour.Yet intelligent movable device users can be chosen in rapid scanning greater or less than moving full scan after one hour and it will be still within the scope of the present invention.
Sweeping fast anchor analyzes and metadata analysis including but not limited to carrying out working time.Analyze working time including but not limited to checking invariant and change to detect.For example, if there is the list of operational process, new those as power user (root) operation will be " invariants " so.Another example of invariant is the mark in mounting point, because some mounting points should be setuid (" user ID being set according to execution "), some should be read-write, but should not be setuid and read-write.Yet, should be understood that analyze working time can relate to except invariant and its will be still within the scope of the present invention.
Metadata analysis generates all addressable file be included on intelligent movable device 128 and the list of attribute thereof, and described attribute is including but not limited to size, type, modification time, the owner and group.Once complete, metadata comparative approach just depends on baseline to compare for described list.Baseline is last " int " if scanning or this are that the first scanning or baseline do not mate with list, and baseline is retrieved from back-end server inquiry with from call database 110 so.Initial movable intelligent apparatus OS, application program and file on the intelligent movable device that the baseline Jiang Shicong manufacturer of storage receives in call database 110.If file has been introduced to mobile security device 128, safety charger 124 will detect and safety mobile device 124 will be labeled as to possibility " impaired " it so.
Full time scan will take about 10 minutes and move.Full time scan adds following extra analysis scan by each being included in the scanning of carrying out during rapid scanning: file system analysis, signature detection, application program analysis and restart to booting image analysis.
When the file system analysis that the present invention is contained is included in safety charger 124 and is connected to intelligent movable device 128, addressable each file of safety charger 124 is downloaded to each and comparison of hashed in safety charger 124, these files of hash and the previous hash of scanning.The file from last " int " scanning and the hash that are stored on safety charger 124 are used as baseline.If if this is the first scanning or scanning indication " impaired ", safety charger 124 devices are baseline inquiry back-end server 104 so, and described baseline retrieval is from call database 110.Once set up baseline, whether safety charger 124 just can revise any system file by detection of malicious software.By this way, even if safety charger 124 can be verified intelligent movable device 128, it has been updated to new version.
Signature detection analysis contributes to detect old Malware and utilization.Signature detection analysis is at system file and comprise in the application program of application program internal file and completing.Because observed Malware is used public utilization, for privilege, upgrade, this can arrive by suitable signature detection, so carry out signature detection analysis.According to the present invention, the database of signature is remained on safety charger 124 for this object and this database preferably from upgrading with the every day of communicating by letter of internal network 102.Signature remains in relational database, such as can be from Hipp, and the SQLite that Wyrick & Company obtains.
In order to make safety charger 124 prevent the attack of intelligent movable device OS and application program to become the most effective, safety charger 124 is only scan for malware and utilization but also should be able to provide the patch that can prevent this type of Malware and utilize access OS or application program to OS and the application program of operation on intelligent movable device 128 not.Therefore, take portion's network 102 exploitation into account when finding the patch of leak, can from back-end server 102, these patches be downloaded to safety charger 124 by the Internet connection of intelligent movable device 128.Then, can these patches be uploaded to and be implemented in working time OS and the application program of intelligent movable device 128, or according to another process, it comprises leak file alternative Process.Also consider that these patches can be uploaded to and be implemented in by third party's system of authorizing OS and the application program of intelligent movable device 128, the agency that third party's system maintenance of described mandate and the proprietary communication link of internal network 102 are used for safety charger 124 is to provide the object of patch.Yet uploading of patch will preferably complete by safety charger 124.
Application program analysis is carried out by all application programs of listing and download on intelligent movable device 128 as the part of scanning.This scanning will check application program and find suspicious actions.For example, if Malware is attempted by changing extension name by some image files that disguise oneself as in its file, this will be detected because this document type is not mated with its extension name so.Whether this scanning also detects pseudo-application program by the title by inspection application program in the application database of intelligent movable device 128, and if be like this, whether it is signed by correct author so.In addition, scan the application program license that will check for such as reading the excessive risk combination of SMS+ access the Internet, or promote the license of utilization.
Restart to the use of booting image analysis based on self-defined booting image.According to this analysis, safety charger 124 will be restarted intelligent movable device 128 to be uploaded to the booting image of boot loader by USB, if so OS is " impaired ", it cannot cheat safety charger 124 so, because impaired OS does not have operation and do not affect scanning.Restarting process can be carried out without human intervention.
Preferably, self-defined reflection can be incorporated to the recovery subregion of intelligent movable device 124.Once in recovering reflection, booting image analysis will allow more wider file.Yet, no matter being in or be not in, recovers in reflection in self-defined reflection, restart to booting image analysis and all will carry out.
Should be understood that configurable safety charger can comprise greater or less than two previous disclosed scannings and scanning rapid scanning and can be different from those disclosed and still within the scope of the present invention.Similarly, full scan can comprise greater or less than six previous disclosed scannings and scanning and can be different from those disclosed and still within the scope of the present invention.
If scanning result indication exists " the impaired object " of identification, can take following measures: via LED lamp (referring to Fig. 5 A and Fig. 5 B), LCD (referring to Fig. 6 A and Fig. 6 B), SMS and/or Email warning user; From enterprise network, disconnect intelligent movable device; Or intelligent movable device is returned to previous state.Should be understood that other method and still within the scope of the present invention that can use " impaired object " notice.
Once safety charger 124 or unlimited scanister 700 (Fig. 7) (following general designation " safety charger 124 ") complete scanning, and take adequate measures, safety charger 124 is just to internal network 102 reporting scanning results.
Back-end server 104 comprises monitor (not shown), and it can make the problem that keeper can supervisory system by network manager access, and investigates for the problem of identification.For example, problem is including but not limited to application program, the brush intelligent movable device of machine and the intelligent movable device of loss of infection, violation of policy.If intelligent movable device 128 has charged, so now, intelligent movable device users can, in the situation that intelligent movable device users does not comprise the assurance of lasting back door wooden horse, unless safety charger 124 separately has indication, be extracted it from safety charger 124.
Scanning result is reported to back-end server 104, and wherein they are stored in (referring to Fig. 1) in scan database 112.To internal network 102, report the result and allow intelligent movable device users and system manager to manage respectively intelligent movable device and check report.Intelligent movable device users can be used as client 122 (Fig. 1) by authentication mechanism 120 these information of access.
Referring now to Fig. 8-12, describe and carry out fast and the method for full scan and reporting scanning result.
With reference to figure 8, always with 800, represent, show the schematic flow diagram that carries out Malware and other virus scan on the indication device for the system such as based on blackberry, blueberry and the system based on Android.Although with respect to the system based on blackberry, blueberry with systematically discussed Fig. 8-12 based on Android, but should be understood that the present invention is equally applicable to the board device of mobile-payment system, mobile health-care system, hand-held enforcement system or other type of other intelligent movable apparatus system, smart phone, for example point of sales system (wired and wireless), and this type of other system within the scope of the present invention.
Refer again to Fig. 8, once set up wired or wireless connection between safety charger 124 and intelligent movable device 128, step 802 just starts.In step 804, safety charger 124 checks whether intelligent movable device is " new ".New means in step 802, and when safety charger 124 being inserted to the power supply of electric wall plug receptacle for example, in step 804, safety charger 124 checks to determine whether intelligent movable device is connected with it.Once intelligent movable device is connected to safety charger 124 or safety charger 124 is extracted from power supply, circulation just finishes.
If intelligent movable device is new, process continues to step 806 to determine the platform of intelligent movable device.If the device based on blackberry, blueberry, method continues to step 808, wherein scans according to Fig. 9 and carries out.As shown, for the system based on blackberry, blueberry, only there is full scan; Yet, should be understood that also and can carry out rapid scanning and it will be still within the scope of the present invention about the system based on blackberry, blueberry.
Fig. 9, always represents with 900, illustrates for carrying out the schematic flow diagram of whole Malwares and other virus scan in the system based on blackberry, blueberry.As illustrated in step 904, safety charger 124 carries out the application program analysis scan of intelligent movable device 128.Scanning is for example, including but not limited to checking to determine whether new application program has been increased to intelligent movable device, any application program and whether has changed (redaction, different author), and checks suspicious actions.
Return to the step 810 of Fig. 8, scanning result is committed to back-end server 104 and by result store in scan database 112.
Refer again to Fig. 8, in step 812, the rapid scanning of the system based on Android carries out according to Figure 10.Figure 10 illustrates for carrying out the schematic flow diagram of quick Malware and other virus scan in the system based on Android.
With reference to Figure 10, always in step 1000, two scannings are shown.The first scanning is that the metadata scanning and second in step 1004 is other system property of inspection in step 1008, such as operational process, mounting point etc.These scannings had previously been described.
Return to the step 814 of Fig. 8, the result of rapid scanning is committed to back-end server 104 and then scanning result is stored in scan database 112.
In step 816, between the time of rapid scanning operation and the time of full scan operation, life period postpones.This time interval can be determined by system user.Yet the described time interval is preferably approximately 1 hour.
In step 818, full scan carries out according to Figure 11.Figure 11 illustrates for carrying out the schematic flow diagram of whole Malwares and other virus scan in the system based on Android.
With reference to Figure 11, always by step 1100, represent, there is the scanning of the carrying out of six types.The first two scanning, in the metadata scanning of step 1104, and scans in other system property of step 1108, is all the identical scanning moving during rapid scanning.The 3rd scanning in step 1106 is system file scanning.The 4th scanning in step 1110 is to scan by restarting the file system of videoing to recovery.The 5th scanning 1112 is signature detection scanning.The 6th scanning 1114 is application program analysis scan.
Return to the step 820 of Fig. 8, the result of full scan is committed to back-end server 104 and by result store in scan database 112.
With reference to step 810, step 814 and the step 820 of figure 8, indication is committed to internal network 102 by back-end server 104 by the result of scanning they can be stored in scan database 112.The process that scanning result is committed to internal network 102 is carried out according to process shown in Figure 12.More specifically, Figure 12 illustrates the schematic flow diagram of " the submission result " that be associated for the treatment of the Malware carrying out in the system with based on blackberry, blueberry and the system based on Android and other virus scan.
With reference to Figure 12, step 810, step 814 and step 820 that Reference numeral 1202 relates in Fig. 8 are submitted result to.When scanning result being committed to back-end server 104 when being stored in scan database 112, process continues to step 1204, wherein determines that platform is system or the system based on Android based on blackberry, blueberry.If the system based on blackberry, blueberry, process continues to step 1206, wherein result is kept in the local data base on safety charger 124 (Fig. 1).Afterwards, process continues to step 1208, and wherein at safety charger 124, the Internet connection by intelligent movable device 128 is set up and time being after a while connected of back-end server 104 server 104 transmission scanning results to the back-end.The scanning result being received by back-end server 104 will be stored in scan database 112.Afterwards, process moves to " submit to and finish " in step 1220.
If in step 1204, determine that platform is the system based on Android, process continues to step 1210 so.In step 1210, safety charger 124 is used the Internet connection setting of intelligent movable device 128 and the agency of back-end server 104.Once this agency is set, safety charger 124 is set up with the safety of back-end server 104 and is connected in step 1212 attempting.If in the connection failure of step 1212, process will continue to step 1214 so, wherein scanning result will be kept in the local data base of safety charger 124.Yet if in the safe successful connection of step 1212, process continues to step 1216 so, wherein server 104 sends scanning results to the back-end.Next, process continues to step 1218, and wherein server 104 sends the result from all preservations of the previous scanning of step 1214 to the back-end, and process will continue to step 1220, and it finishes to scan submission process.
Describe now safety charger 124 of the present invention, referring now to Fig. 3 and Fig. 4, be described in the application program of download and the two-way trust between intelligent movable device.
As prior statement, the reliability of application program that system and method for the present invention has preferably been downloaded to intelligent movable device by checking is to prevent that pseudo-application program is on these intelligent movable devices and by its infection.Therefore,, when safety charger 124 carries out the viral at least full scan of the Malware of intelligent movable device 128 or other type, safety charger 124 will access be downloaded to all application programs of intelligent movable device 128.For the intelligent movable device operating on the OS based on Android, will mean that the present invention will have the access right of application package (" the APK ") file to each application program.Each in application program be signed makes intelligent movable device 128 can make the rational hypothesis about the identity of the entity of release application program.This information for certifying signature not only effectively but also corresponding to suitable publisher.
According to the present invention, the part subregion of scan database 112 is used for storing about downloading to the information of the application program of intelligent movable device 128 and the author/publisher of application program.This information that relates to all application programs on it by safety charger 124 scanning intelligent movable devices 128 and download completes.This information will be sent to back-end server 104 and be associated with suitable author/publisher information of storing in the part of subregion at scan database 112.Preferably, suitable author/publisher will cooperate to promote the information structure scan database with author/publisher.Scan database also forms application program popular in market and obtainable publisher data.For the application program of these types, system manager is by checking publisher information and be added into database." author/publisher " information that should be understood that can be independent " author " or " publisher " information, or " author " and " publisher " information, and still within the scope of the present invention.
Reason author/publisher Information and application routine data being stored in together in the part of subregion of scan database 112 is that pseudo-application program does not have correct publisher's information associated with it conventionally.Therefore, when application program that needs checkings is downloaded, safety charger 124 by the Internet connection that uses intelligent movable device 128 to the back-end server 104 send the title of application programs.Back-end server 104 will be connected to the part of subregion of scan database 112 and the public keys of publisher from authors to safety charger 124 that retrieve suitable author/publisher information and send to carry out proof procedure.This public keys will be kept at the checking in future that makes it can be used for this application program in the local data base of safety charger 124.This process will described subsequently in more detail.
The intelligent movable device that system and method for the present invention also allows application program and service trusted application to be downloaded to.Conventionally, when intelligent movable device users is used application program by logining to remote service, the author of application program and service/publisher supposition intelligent movable device is the safe and authorized application program that receives.Yet, cannot confirm this point.
System and a method according to the invention, it is safe and authorized receive application program or service with checking intelligent movable device that application program publisher and attendant can be connected to front-end server 106.Proof procedure starts during to internal network 102 reporting scanning result by back-end server 104 at safety charger 124.Scanning result is stored in scan database 112 and whether these results will indicate intelligent movable device " impaired ".The IMEI (" International Mobile Station Equipment Identification ") that also has intelligent movable device comprising together with scanning result.
Scanning is by each application program and the OS that determine on intelligent movable device.Author/publisher the information being stored in scan database will be associated with each application program and OS.
For the object of application program verification intelligent movable device, internal network 102 is by the intelligent movable device that produces service key and send to each author/publisher to be downloaded to for verifying the application-specific of author/publisher.Service key by be stored in scan database 112 in for suitable author/publisher information of each application program, be associated.This information is stored in scan database 112 for record and report, and notification application publisher and attendant's intelligent movable device safety whether.
After scanning and result is sent to internal network 102, back-end server 104 is by the author/publisher information determining whether to be stored in scan database for each application program and OS.If do not found, internal network 102 will be asked described information from author/publisher so.
Internal network 102 to author/publisher send service key for each application program or single service key for all authors at scan database 112/application program of publisher.Internal network 102 also can produce a plurality of service key, its contain the varying number in scan database author/application program of publisher.These service key will be stored in scan database.
Preferably, proof procedure is attempted running application and starts when remote service must permit the access of application programs at intelligent movable device.Application program will be used the Internet connection of intelligent movable device to be connected to remote service for carrying out the object of login process and asking some information to be sent to the object of internal network 102 for verifying from remote service during login process.
More specifically, before application program sends any information to remote service, application program provides logging on authentication by request intelligent movable device, such as username and password.When obtaining, this information is sent to remote service for asking the access of application programs.Application program also sends IMEI to intelligent movable device.
The information of the object for application program/service verification that preferably, request sends to internal network 102 including but not limited to IMEI, service key and serve relevant data (including but not limited to user name, password) and measure (such as give a warning, impose a fine or the measure of other type to provide the notice of access denied).At least, remote service sends by forward end server 106 service key that is used to identify the IMEI of efficient apparatus and the author/publisher of recognition application by cellular network.Front-end server 106 can be used this information to make comparison to the information relevant with service key with IMEI being stored in scan database 116.Once this information is suitably mated, whether front-end server will send intelligent movable device to remote service is " impaired ", " int " or " not scanning recently ".Should be understood that and can send other status indicator and still within the scope of the present invention.Once receive status indicator, remote service will determine whether to permit by accepting or refuse logging request the access of intelligent movable device application programs.
In order to be authorized to down load application program with the application program that is relatively effective to of scan-data library information with checking intelligent movable device, its application program should be revised by application author/publisher makes them retrieve the IMEI of mobile device and itself and log-on message are sent to remote service.Yet, considering other method of acquisition IMEI and need only them to make application program can access IMEI, they are just within the scope of the present invention.
As statement, the present invention contributes to prevent the intelligent movable device pretended to be acquired information wrongly.Whether embodiments of the present invention make IMEI that service can check to determine assailant for real mobile device.If not, mobile device will not be considered mobile device trusty so.In addition, once mobile device is labeled as to " impaired " or " recently not scanning ", device is by denied access or take other punitive measures, such as give a warning, impose a fine or the measure of other type to provide the notice of access denied.
Referring now to Fig. 3, describe the method for intelligent movable device " trust " application program in detail.Fig. 3, always represents with 300, illustrates for determining the schematic flow diagram of the intelligent movable device the trust whether application program of download can be downloaded to by it.In step 302, the publisher of application program transmits its signature by front-end server 106 to internal network 102.These signatures are stored in the part of subregion of scan database 112 and are associated with the application program of each publisher.Preferably, the part of the subregion of scan database 112 will comprise that application program/application program as much as possible publisher signing messages makes system will be ready to verify application program as much as possible.
In step 304, intelligent movable device 128 is downloaded the one or more application programs that need checking.In step 306, the application program that has download is determined in safety charger 124 scannings.In step 308, utilize by the knowledge of the application program of downloading of scanning, safety charger 124 is connected to the public keys of the publisher of internal network 102 and inquiry scan database by back-end server 104.Once safety charger 124 receives suitable publisher's public keys, in step 310, it will check the signature of the first application program with checking publisher.If signature is effectively, process will move to step 312 and application program will be application program trusty so.Yet, if signature do not mate, so application program by be not empirical tests and process will move to step 314, wherein application program is labeled as to " mistrustful application program." if it is not application program trusty, can be deleted and send notice to system user and/or system manager.
After whether definite application program is credible, process moves to the step 316 that determines frame, and it determines whether this is last application program.If it is not last application program, process will continue to step 310 and check that next application program is to determine that whether it is effectively with credible or invalid and insincere so.This is repeated until checked last application program, and process continues to step 318 afterwards.
Referring now to Fig. 4, the method that application program is trusted intelligent movable device is described.Fig. 4, always represents by step 400, application program for determine downloading is shown and whether can trusts the schematic flow diagram that its intelligent movable device being downloaded to is the intelligent movable device of the authorized application program that receives described download.
With reference to the step 402 of figure 4, safety charger 124 carry out fast or full scan and by back-end server 104 to internal network 102 reporting scanning results, then it be stored in scan database 112.Safety charger 124 also comprises the IMEI of intelligent movable device 128 except scanning result, and it is stored in scan database 112 with the scanning result being associated.
Scanning result will comprise each application program on intelligent movable device 128 and the list of OS.Back-end server 104 will check to determine whether author/publisher information is associated with each application program and the service key of distributing to each application program.If not, front-end server 106 will be for informational linkage author/publisher of author/publisher.Once obtain, in step 404, front-end server 106 sends service key and service key by the author to application program/publisher and also will be stored in scan database 112 checking for intelligent movable device 128 with author/publisher information.
When intelligent movable device 128 is when step 406 brings into operation the application program of downloading, the application program of download starts to verify the whether believable process of intelligent movable device 128, thereby and authorizes reception and use application program.In step 406, the application program of download for example, from intelligent movable device 128 request log-on message, username and passwords.This information sends log-on message and IMEI and service key by intelligent movable device users input intelligent movable device 128 and application program to remote service.
The log-on message being sent to remote service by the application program of downloading also comprises the request of some information sending to internal network 102.This information is including but not limited to IMEI, service key and serve relevant data (including but not limited to user name, password) and measure.At least, remote service will send IMEI and service key.
The request that application program based on by downloading sends to remote service, in step 410, remote service is sent to the front-end server 106 of internal network 102 to major general IMEI and service key via authentication mechanism 120.Front-end server 106 is for being stored in suitable IMEI and the service key inquiry scan database 112 in scan database 112.If there is no mate, front-end server will transmit and not exist coupling and proof procedure to finish to remote service.Yet what will consider is that system will allow remote service to submit IMEI and service key at least three times before finally finishing proof procedure again.If there is the coupling of IMEI and service key, front-end server is " impaired ", " int " or " not scanning recently " by the state of retrieval intelligent movable device 128 so.When preferably, intelligent movable device was scanned within its three (3) days, be not considered to " not scanning recently ".Yet, should be understood that " recently not scanning " can be greater or less than three (3) days and still within the scope of the present invention.
In step 412, front-end server 106 will be connected to remote service and the state of relevant intelligent movable device 128 is provided, and it is " impaired ", " int " or " recently scanning ".In step 414, author/publisher will allow or refusal logging request based on described state.A kind of possible result is if the state returning is " impaired " or " recently scanning ", and intelligent movable device 128 will not trusted and logging request will be rejected so.Relative, if during the state returning " int ", intelligent movable device 128 will be trusted and logging request will be allowed.Yet, even if should be understood that the state that is back to remote service is " impaired " or " not scanning recently ", the access whether author/publisher of remote service authorizes application programs also will be depended on many factors, this comprise if permit access so which data by risky.
In the computer program that the embodiment of system and method for the present invention or its part can be carried out on computer hardware, firmware and/or programmable computing machine or server, realize, each of described programmable computing machine or server comprises processor and the storage medium (comprising volatibility and nonvolatile memory and/or memory element) that can be read by processor.Any computer program can advanced procedures or object-oriented programming language and realizing with within computer based system or its PERCOM peripheral communication.
Any computer program can be stored on manufactured goods, for example, for example, such as storage medium (CD-ROM, hard disk or disk) or device (computer peripheral), it can be read for read storage medium or device configuration and operation computing machine when carrying out the function of embodiment at computing machine by universal or special programmable calculator.Embodiment or its part also machinable medium of available computers application configuration realize, once wherein carry out, the instruction in computer program just makes machine operation to carry out the function of embodiment mentioned above.
The embodiment of system and method for the present invention mentioned above or its part can be used for multiple application program.Although embodiment or its part are not limited to this, embodiment or its part can be utilized following except other electronic unit and realize: the storage arrangement in microcontroller, general purpose microprocessor, digital signal processor (DSP), reduced instruction set computer calculate (RISC) and sophisticated vocabulary calculating (CISC).In addition, embodiment mentioned above or its part also can be used integrated circuit block to realize, and described integrated circuit block refers to e-command that storage carried out by microprocessor or the storer of the primary memory that is stored in the data of using in arithmetical operation, buffer memory or other type.
These descriptions can be applied in any calculating or processing environment.Embodiment or its part can realize in hardware, software or both combinations.For example, embodiment or its part for example can be used, such as the one or more Circuits System in FPGA (Field Programmable Gate Array) (ASIC), logic gate, processor and storer and realize.
Although described several concrete form of the present invention, clearly various modifications are possible.The present invention is not intended to be limited to embodiment described herein.Detailed description when considering by reference to the accompanying drawings of other advantage of the present invention and novel feature and becoming apparent.

Claims (54)

1. a computer implemented system, its at least software (" Malware ") of malice for giving electronic installation power charge and scan described electronic installation during described computer implemented system being at least part of time cycle of described electronic installation power charge, described computer implemented system comprises:
Power connector, it is for connecting described computer implemented system to power supply;
Electric power transducer, it is connected to described power connector for the described electric power input to described power connector being converted to the electric power that is applicable to inputing to described electronic installation with the electric power means of storage charging to described electronic installation;
Controller, its for the operation of controlling described computer implemented system at least to scan at least Malware of described electronic installation during described computer implemented system is at least part of time cycle of described electronic installation power charge;
System storage, it is connected to described controller at least storing computer program and data at least to scan at least Malware of described electronic installation during described computer implemented system is at least part of time cycle of described electronic installation power charge;
Safe digital card, it is connected to described controller makes described computer implemented system during described computer implemented system is at least part of time cycle of described electronic installation power charge, at least scan at least Malware of described electronic installation for the database on storage operation system computer based security procedure at least and device; And
The electronic installation connector of described computer implemented system, its for connect described computer implemented system to described electronic installation provide to described electronic installation to be applicable to the electric power to the conversion of the described electric power means of storage charging on described electronic installation, and for the two-way communication between described computer implemented system and electronic installation with during giving at least part of time cycle of described electronic installation power charge in described computer implemented system, at least scan at least Malware of described electronic installation and provide scanning result from described electronic installation to described computer implemented system for being stored in described safe digital card.
2. computer implemented system according to claim 1, wherein said power supply comprises external power source.
3. computer implemented system according to claim 1, wherein said power supply changeover device comprises for alternating current (" AC ") being converted to the transformer of direct current (" DC ").
4. computer implemented system according to claim 1, wherein said controller comprises computer processing unit (" CPU ").
5. computer implemented system according to claim 1, wherein said system storage comprises random access storage device (" RAM ").
6. computer implemented system according to claim 5, wherein said RAM comprises program code, data and the volatibility system file of storage running.
7. computer implemented system according to claim 1, wherein said computer based security procedure comprises safety analysis computer based program.
8. computer implemented system according to claim 1, wherein said computer implemented system comprises virus scan.
9. computer implemented system according to claim 1, wherein said computer implemented system comprises whether the scanning result that status indicator is returned with indication has been identified in the Malware on described electronic installation.
10. computer implemented system according to claim 9, wherein said status indicator comprises at least one light emitting diode (" LED ") lamp.
11. computer implemented systems according to claim 10, wherein said status indicator comprises liquid crystal display (" LCD "), and whether described liquid crystal display has identified Malware described electronic installation on by the scanning result that at least indication is returned thereon.
12. computer implemented systems according to claim 1, wherein said electronic installation comprises intelligent movable device.
13. computer implemented systems according to claim 12, wherein said intelligent movable device is selected from and at least comprises following group: cell phone, personal digital assistant, board device, smart phone, mobile-payment system, mobile health-care system and hand-held law and executive system.
14. 1 kinds of computer implemented systems, it uses at least rapid scanning after comprehensive full scan to scan the software (" Malware ") at least maliciously of described electronic installation, and described computer implemented system comprises:
Controller, it controls the operation of described computer implemented system at least described rapid scanning and the comprehensive full scan of at least Malware of described electronic installation;
System storage, it is connected to described controller at least storing computer program and data to carry out described rapid scanning and the comprehensive full scan of at least Malware of described electronic installation;
Safe digital card, its be connected to described controller at least for the database on storage operation system, computer based security procedure and device to carry out described rapid scanning and the comprehensive full scan of at least Malware of described electronic installation; And
Transceiver, it is connected to described controller and to carry out the described rapid scanning of at least Malware of described electronic installation, with comprehensive scanning and from described electronic installation, receives scanning result for being stored in described safe digital card for the wireless two-way communication between described computer implemented system and described electronic installation.
15. computer implemented systems according to claim 14, wherein said controller comprises computer processing unit (" CPU ").
16. computer implemented systems according to claim 15, wherein said system storage comprises random access storage device (" RAM ").
17. computer implemented systems according to claim 16, wherein said RAM comprises program code, data and the volatibility system file of storage running.
18. computer implemented systems according to claim 17, wherein said computer based security procedure comprises safety analysis computer based program.
19. computer implemented systems according to claim 14, wherein said computer implemented system comprises virus scan.
20. computer implemented systems according to claim 14, wherein said computer implemented system comprises whether the scanning result that status indicator is returned with indication has been identified in the Malware on described electronic installation.
21. computer implemented systems according to claim 20, wherein said status indicator comprises at least one light emitting diode (" LED ") lamp.
22. computer implemented systems according to claim 20, wherein said status indicator comprises liquid crystal display (" LCD "), and whether described liquid crystal display has identified Malware described electronic installation on by the scanning result that at least indication is returned thereon.
23. computer implemented systems according to claim 14, wherein said electronic installation comprises intelligent movable device.
24. computer implemented systems according to claim 23, wherein said intelligent movable device is selected from and at least comprises following group: cell phone, personal digital assistant, board device, smart phone, mobile-payment system, mobile health-care system and hand-held law and executive system.
25. 1 kinds of computer implemented methods, its at least software (" Malware ") of malice for giving electronic installation power charge and scan described electronic installation during described computer implemented system being at least part of time cycle of described electronic installation power charge, described computer implemented method comprises the following steps:
(a) connect power supply to the electric power input connector that is incorporated to the charging/scanner device of the first hardware unit, wherein said charging/scanner device for when giving electronic installation power charge, scan the Malware of described electronic installation, wherein said charging/scanner device at least comprise electric power transducer, controller, system storage, safe digital card with for being connected described scanning/charging device to the electronic installation connector of described electronic installation;
(b) with described electric power transducer, convert the described electric power input to described scanning/charging device to be applicable to inputing to described electronic installation electric power for the electric power means of storage charging to described electronic installation;
(c) the described electronic installation connector that connects described scanning/charging device to described electronic installation is used for
(1) provide to described electronic installation to be applicable to the electric power to the conversion of the electric power means of storage charging of described electronic installation, and
(2) by the electronic installation connector of described connection, set up two-way communication at least for scanning at least Malware of described electronic installation and receive scanning result from described electronic installation during described scanning/charging device being at least part of time cycle of described electronic installation power charge;
(d) during described scanning/charging device is given at least part of time cycle of described electronic installation power charge under the described control at described controller according to the following at least Malware that scans described electronic installation,
(1) be stored in computer program and the data in system storage, and
(2) database on operating system, computer based security procedure and the device on safe digital card;
(e) on described scanning/charging device, the electronic installation connector by described connection receives the scan for malware result from described electronic installation; And
(f) use the status indicator being associated with described the first hardware unit to show described scan for malware result.
26. computer implemented methods according to claim 25, wherein said status indicator comprises at least one light emitting diode (" LED ").
27. computer implemented methods according to claim 25, wherein said status indicator comprises liquid crystal display (" LCD "), described liquid crystal display by thereon at least described in indication the scanning result that returns whether identified the Malware on described electronic installation.
28. computer implemented methods according to claim 25, wherein said method is included in described scanning/charging device to the virus that scans described electronic installation during at least part of time cycle of described electronic installation power charge.
29. 1 kinds of computer based systems, it is for determining at electronic installation and downloading to the two-way trust between the computer based application program of this type of electronic installation, described computer based system comprises:
(a) scanister, it is removably connected to described electronic installation, wherein said scanister for scan described electronic installation malice software (" Malware ") and whether receive the described electronic installation of indication impaired or because there is no the int scanning result of Malware because having Malware on it; With
(b) internal network, it at least comprises,
(1) server, it at least comprises front-end server and back-end server, wherein said front-end server receives request for the client's input media from described internal network outside and reply is offered to client's input media of described internal network outside, and wherein said back-end server for described scanister two-way communication to receive at least scanning result from described scanister and to transmit at least updating computer software to described scanister
(2) internal network database, it is connected to described front-end server and back-end server at least for storing customer information, electronic installation information and scanning result,
(3) certificate verification mechanism, it is for transmitting certificate information to described back-end server, and to described scanister, transmits certificate information for set up secure communication between described scanister and described back-end server by described back-end server, and
(4) authentication member, it is communicated by letter for the authentication between client's input media of being controlled at described internal network outside and described front-end server.
30. computer based systems according to claim 29, wherein said electronic installation is connected to described back-end server by wireless connections.
31. computer based systems according to claim 30, wherein comprise that with the described wireless connections between described back-end server wireless Internet is connected at described electronic installation.
32. computer based systems according to claim 31, wherein said scanister is connected to described back-end server by the described wireless Internet of described electronic installation.
33. computer based systems according to claim 29, wherein said certificate verification mechanism offers described back-end server by least predetermined certificate verification mechanism certificate, and at least predetermined certificate verification mechanism certificate and private key are offered to described scanister for described back-end server relatively its described certificate verification mechanism's certificate receiving from described certificate verification mechanism and its described certificate verification mechanism certificate from described scanister reception.
34. computer based systems according to claim 29, wherein said internal network database at least comprises customer information database, electronic installation information database and scan database.
35. computer based systems according to claim 34, wherein said customer information database for store the information that at least comprises that client is associated with one or more electronic installations customer information and for the mutual client of described internal network setting.
36. computer based systems according to claim 34, wherein said electronic database of information is for storing the electronic installation information of the information that at least comprises all electronic installations of being supported by described internal network.
37. computer based systems according to claim 36, each electronic installation of wherein supporting for described internal network, described electronic database of information at least comprises the baseline of renewal and the recovery of the described electronic installation reflection of the computer software platform on the described computer software version of described the above computer software of electronic installation, described electronic installation.
38. computer based systems according to claim 29, wherein said scan database is for storing the scanning result receiving from described scanister, and it comprises that electronic installation is impaired or int.
39. according to the computer based system described in claim 38, and wherein said scan database is included as each electronic installation and at least stores the list of the computer based application program on described electronic installation, the file on described electronic installation and the list of hash, the type of the time and date of each scanning and each scanning.
40. computer based systems according to claim 29, wherein said scanister comprises virus scan.
41. 1 kinds of computer based methods, its for determine the computer based application program downloaded by electronic installation be whether the application program that can trust to move on described electronic installation, described computer based method comprises the following steps:
(a) publisher of Downloadable computer based application program transmits each the publisher's identifying information in the Downloadable computer based application program of concrete publisher to internal network, and wherein said internal network is stored the described publisher identifying information being associated with the Downloadable computer based application program of each concrete publisher in internal network database;
(b) connecting scanister to described electronic installation, for scan for malware and described scanister, to receive the described electronic installation of indication impaired or because there is no the int scanning result of Malware because having Malware on it, and described scanister is stored described scanning result thereon, definite at least one computer based application program of described electronic installation and at least publisher identifying information that storage is associated with the computer based application program of described at least one download of downloading to of wherein said scanister;
(c) described scanister is set up with the safe of described internal network away from described scanister and is connected, and be connected to the described internal network database of the described publisher identifying information that storage is associated with each concrete publisher Downloadable computer based application program, and inquire about the described publisher identifying information that relating to of described internal network database downloads to described at least one computer based application program of the described electronic installation of identifying in step (b);
(d) described internal network database response transmits the described publisher identifying information that relates to described at least one the computer based application program that downloads to the described electronic installation of identifying in step (b) in the described inquiry of the described scanister from step (c) and to described scanister; And
(e) the described publisher identifying information that described scanister comparison receives from described internal network database with download to step (b) publisher's identifying information of being associated of described at least one computer based application program of the described electronic installation identified, and if described publisher identifying information coupling, determine that so described at least one the computer based application program that downloads to the described electronic installation of identification in step (b) is effective/believable computer based application program and can be used by described electronic installation, and if described publisher identifying information does not mate, determine that so described at least one the computer based application program that downloads to the described electronic installation of identification in step (b) is invalid/incredible computer based application program and can not be used by described electronic installation.
42. according to the computer based method described in claim 41, wherein connects described scanister to described electronic installation and comprises that using 802.11 radio frequencies (" RF ") connection or bluetooth to connect is wirelessly connected to described electronic installation by described scanister.
43. according to the computer based method described in claim 42, and wherein said electronic installation is connected to described internal network by wireless connections.
44. according to the computer based method described in claim 43, wherein at described electronic installation, comprises that with the described wireless connections between internal network wireless Internet is connected.
45. according to the computer based method described in claim 44, and wherein said scanister is connected to described internal network by the described wireless Internet of described electronic installation.
46. according to the computer based method described in claim 41, and the publisher's identifying information being wherein stored in described internal network database comprises publisher's signing messages.
47. according to the computer based method described in claim 41, and wherein said publisher signing messages comprises publisher's public keys.
48. 1 kinds of computer based methods, it is for determining whether the computer based application program of being downloaded by electronic installation can trust the authorized computer based application program that receives described download of described electronic installation, and described computer based method comprises the following steps:
(a) connecting scanister to described electronic installation, for scan for malware and described scanister, to receive the described electronic installation of indication impaired or because there is no the int scanning result of Malware because having Malware on it, and described scanister is stored described scanning result thereon, wherein said scanister is determined at least one computer based application program and the described electronic installation identifying information that downloads to described electronic installation;
(b) described scanister is set up with the safe of described internal network away from described scanister and is connected, and reports described scanning result and described electronic installation identifying information to described internal network;
(c) described internal network is stored described scanning result and electronic installation identifying information and application program publisher information related to this for downloading to described at least one computer based application program of described electronic installation in network data base;
(d) described internal network generates the service key that relates to described at least one computer based application program, and in described network data base, store described service key and described application program publisher information, and send described service key to the described application program publisher away from described internal network;
(e) in step (a), described at least one computer based application program of identification is used the wireless connections of setting up by described electronic installation to set up the connection from described electronic installation to application program publisher and is at least transmitted the request that log-on message, described electronic installation are logined the request of described application program, described electronic installation identifying information and sent authorization information to described internal network;
(f) described application program publisher set up with described internal network be connected and to described internal network transmission authorization information, wherein said authorization information at least comprises described electronic installation identifying information and service key;
(g) described internal network receives described authorization information and more described authorization information and is stored in described electronic installation identifying information and the service key in described network data base, and if described authorization information is mated step (i), if described authorization information do not mate; step (h);
(h) described internal network transmits proof procedure to described application program publisher and finishes, because described electronic installation identifying information or service key do not mate the information of electronic installation based on identification or be stored in the service key in described network data base;
(i) described internal network transmits the state of described electronic installation based on scanning result to described application program publisher, if comprise that at least Malware or not impaired described electronic installation on it does not comprise the Malware on it if described scanning result at least comprises the impaired described electronic installation of described electronic installation; And
(j) the described logging request of described electronic installation is permitted or refused to the described state of described publisher based on being transmitted to described publisher by described internal network in step (i).
49. according to the computer based method described in claim 48, and wherein step (h) comprises and allows described application program publisher before described proof procedure finishes, to submit described electronic installation identifying information and the predetermined number of times of service key to again.
50. according to the computer based method described in claim 49, and wherein step (h) comprises and allows described application program publisher before described proof procedure finishes, to submit described electronic installation identifying information and service key three times or still less to again.
51. according to the computer based method described in claim 48, and wherein the described state of the described electronic installation based on scanning result comprises " not scanning recently ", if described electronic installation is not scanned within least one (1) sky.
52. according to the computer based method described in claim 51, if wherein the described state of described electronic installation is " not scanning recently ", determines that so the described state of described electronic installation is impaired.
53. according to the computer based method described in claim 48, if the described scanning result wherein receiving from described internal network comprises that electronic installation is int, permits described logging request so in the described application program of step (j) publisher.
54. according to the computer based method described in claim 48, if the described scanning result wherein receiving from described internal network comprises that electronic installation is impaired, refuses described logging request so in the described application program of step (j) publisher.
CN201280065633.XA 2011-11-09 2012-11-08 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner Pending CN104081408A (en)

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US201161557699P 2011-11-09 2011-11-09
US61/557,699 2011-11-09
US201161567320P 2011-12-06 2011-12-06
US61/567,320 2011-12-06
US201161570585P 2011-12-14 2011-12-14
US61/570,585 2011-12-14
US13/361,153 2012-01-30
US13/361,153 US8584243B2 (en) 2011-11-09 2012-01-30 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
US13/429,811 2012-03-26
US13/429,811 US8595841B2 (en) 2011-11-09 2012-03-26 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
PCT/US2012/064109 WO2013070885A1 (en) 2011-11-09 2012-11-08 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner

Publications (1)

Publication Number Publication Date
CN104081408A true CN104081408A (en) 2014-10-01

Family

ID=48224695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280065633.XA Pending CN104081408A (en) 2011-11-09 2012-11-08 System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner

Country Status (10)

Country Link
US (1) US8595841B2 (en)
EP (1) EP2776972A4 (en)
JP (1) JP2015504552A (en)
KR (1) KR20150115619A (en)
CN (1) CN104081408A (en)
AU (1) AU2012335732A1 (en)
CA (1) CA2855007A1 (en)
MX (1) MX2014005719A (en)
SG (2) SG11201402235SA (en)
WO (1) WO2013070885A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320886A (en) * 2015-09-22 2016-02-10 北京奇虎科技有限公司 Method for detecting malware in mobile terminal and mobile terminal
CN105828322A (en) * 2015-01-04 2016-08-03 中国移动通信集团辽宁有限公司 User login method, mobile terminal and safety center
CN107864677A (en) * 2015-07-22 2018-03-30 爱维士软件私人有限公司 Access to content verifies system and method
CN108196659A (en) * 2018-01-08 2018-06-22 广东欧珀移动通信有限公司 charging management method, device, storage medium and terminal device
CN111712820A (en) * 2017-12-21 2020-09-25 迈克菲有限责任公司 Method and apparatus for securing a mobile device
CN115782658A (en) * 2022-11-22 2023-03-14 深圳市赛特新能科技有限公司 Multi-channel charging control method and system based on multiple charging standards

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9645992B2 (en) 2010-08-21 2017-05-09 Oracle International Corporation Methods and apparatuses for interaction with web applications and web application data
EP2568463A1 (en) * 2011-09-08 2013-03-13 Thomson Licensing Methods and devices for protecting digital objects through format preserving coding
US9092623B2 (en) 2011-11-09 2015-07-28 Kaprica Security, Inc. System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
US9722972B2 (en) 2012-02-26 2017-08-01 Oracle International Corporation Methods and apparatuses for secure communication
US8935793B2 (en) * 2012-02-29 2015-01-13 The Mitre Corporation Hygienic charging station for mobile device security
US8892876B1 (en) * 2012-04-20 2014-11-18 Trend Micro Incorporated Secured application package files for mobile computing devices
US8639619B1 (en) 2012-07-13 2014-01-28 Scvngr, Inc. Secure payment method and system
US8869274B2 (en) 2012-09-28 2014-10-21 International Business Machines Corporation Identifying whether an application is malicious
US8725645B1 (en) * 2013-01-04 2014-05-13 Cetrus LLC Non-invasive metering system for software licenses
JP6482526B2 (en) 2013-03-15 2019-03-13 オラクル・インターナショナル・コーポレイション Security service management for computer applications by changing object code of computer applications
US9344422B2 (en) 2013-03-15 2016-05-17 Oracle International Corporation Method to modify android application life cycle to control its execution in a containerized workspace environment
US9129112B2 (en) 2013-03-15 2015-09-08 Oracle International Corporation Methods, systems and machine-readable media for providing security services
US8770478B2 (en) 2013-07-11 2014-07-08 Scvngr, Inc. Payment processing with automatic no-touch mode selection
US9178889B2 (en) * 2013-09-27 2015-11-03 Paypal, Inc. Systems and methods for pairing a credential to a device identifier
WO2015081105A1 (en) * 2013-11-26 2015-06-04 Kaprica Security, Inc. Secure charger with malware scanner
US9208348B1 (en) * 2014-01-15 2015-12-08 Symantec Corporation Systems and methods for managing encrypted files within application packages
CN104980564A (en) * 2014-04-09 2015-10-14 腾讯科技(深圳)有限公司 Recharge socket and mobile terminal processing method based on recharge socket
US9564766B2 (en) * 2014-07-30 2017-02-07 Elwha Llc Controllable energy transfer between portable devices
WO2016048404A1 (en) 2014-09-24 2016-03-31 Oracle International Corporation Method to modify android application life cycle to control its execution in a containerized workspace environment
RU2595511C2 (en) 2014-12-05 2016-08-27 Закрытое акционерное общество "Лаборатория Касперского" System and method of trusted applications operation in the presence of suspicious applications
US9762385B1 (en) 2015-07-20 2017-09-12 Trend Micro Incorporated Protection of program code of apps of mobile computing devices
CN105183673B (en) * 2015-08-20 2017-11-10 广东欧珀移动通信有限公司 The method and device of external storage hot plug is supported in recovery mode
CN106874730A (en) * 2015-12-11 2017-06-20 平安科技(深圳)有限公司 The method of calibration and client of bank server login certificate
US10545549B2 (en) 2016-08-12 2020-01-28 Silanna Asia Pte Ltd AC/DC power adapter with accessible internal memory
JP7110733B2 (en) * 2018-05-30 2022-08-02 住友電気工業株式会社 scan processor
EP3933629A1 (en) * 2020-07-01 2022-01-05 Nokia Technologies Oy Apparatus, method and computer program for detecting malware

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050245245A1 (en) * 2002-03-25 2005-11-03 Antti Sorvari Distribution of tasks over time in a mobile terminal
US20110197280A1 (en) * 2010-02-05 2011-08-11 Science Applications International Corporation Network Managed Antivirus Appliance

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11272367A (en) * 1998-03-25 1999-10-08 Sharp Corp Docking unit
US6344727B1 (en) * 2001-03-05 2002-02-05 Motorola, Inc. Charger having a data store and data link
US7401359B2 (en) 2001-12-21 2008-07-15 Mcafee, Inc. Generating malware definition data for mobile computing devices
JP4567275B2 (en) * 2002-02-28 2010-10-20 株式会社エヌ・ティ・ティ・ドコモ Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
US7375492B2 (en) 2003-12-12 2008-05-20 Microsoft Corporation Inductively charged battery pack
US7591018B1 (en) * 2004-09-14 2009-09-15 Trend Micro Incorporated Portable antivirus device with solid state memory
JP2007328462A (en) * 2006-06-06 2007-12-20 Masayuki Sato Computer system, portable telephone set, input/output device, input/output method, and program
US8136164B2 (en) * 2008-02-27 2012-03-13 Microsoft Corporation Manual operations in an enterprise security assessment sharing system
US20100011442A1 (en) * 2008-07-09 2010-01-14 Sumwintek Corp. Data security device for preventing the spreading of malware
JP2009037651A (en) * 2008-11-17 2009-02-19 Fujitsu Ltd Security management system
JP3158114U (en) * 2009-12-02 2010-03-18 株式会社ハギワラシスコム Removable storage device
JP2011040092A (en) * 2010-10-01 2011-02-24 Toshiba Corp Information processing device and method for controlling power unit of the same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050245245A1 (en) * 2002-03-25 2005-11-03 Antti Sorvari Distribution of tasks over time in a mobile terminal
US20110197280A1 (en) * 2010-02-05 2011-08-11 Science Applications International Corporation Network Managed Antivirus Appliance

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105828322A (en) * 2015-01-04 2016-08-03 中国移动通信集团辽宁有限公司 User login method, mobile terminal and safety center
CN105828322B (en) * 2015-01-04 2019-09-17 中国移动通信集团辽宁有限公司 A kind of method, mobile terminal and security centre that user logs in
CN107864677A (en) * 2015-07-22 2018-03-30 爱维士软件私人有限公司 Access to content verifies system and method
CN105320886A (en) * 2015-09-22 2016-02-10 北京奇虎科技有限公司 Method for detecting malware in mobile terminal and mobile terminal
CN105320886B (en) * 2015-09-22 2018-04-06 北京奇虎科技有限公司 Detect the method and mobile terminal that whether there is Malware in mobile terminal
CN111712820A (en) * 2017-12-21 2020-09-25 迈克菲有限责任公司 Method and apparatus for securing a mobile device
CN108196659A (en) * 2018-01-08 2018-06-22 广东欧珀移动通信有限公司 charging management method, device, storage medium and terminal device
CN115782658A (en) * 2022-11-22 2023-03-14 深圳市赛特新能科技有限公司 Multi-channel charging control method and system based on multiple charging standards
CN115782658B (en) * 2022-11-22 2023-10-20 深圳市赛特新能科技有限公司 Multi-channel charging control method and system based on multiple charging standards

Also Published As

Publication number Publication date
EP2776972A4 (en) 2015-07-15
US8595841B2 (en) 2013-11-26
SG10201602851VA (en) 2016-05-30
JP2015504552A (en) 2015-02-12
MX2014005719A (en) 2014-10-13
CA2855007A1 (en) 2013-05-16
SG11201402235SA (en) 2014-09-26
KR20150115619A (en) 2015-10-14
US20130117850A1 (en) 2013-05-09
WO2013070885A1 (en) 2013-05-16
AU2012335732A1 (en) 2014-06-26
EP2776972A1 (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN104081408A (en) System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
US9092626B2 (en) System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
US9092623B2 (en) System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
US20210258304A1 (en) Configuring access to a network service based on a security state of a mobile device
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
US9064114B2 (en) Method and device for scanning data for signatures prior to storage in a storage device
CN102685103B (en) Quarantine network system and quarantine client
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
CN103080946A (en) Method, secure device, system and computer program product for securely managing files
CN104823196A (en) Hardware-based device authentication
CN110011848B (en) Mobile operation and maintenance auditing system
CN106133743A (en) For optimizing the system and method for the scanning of pre-installation application program
US8863241B2 (en) System and method for managing usage rights of software applications
CN106357807A (en) Data processing method, device and system
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
US7437563B2 (en) Software integrity test
CN103841120A (en) Data security management method, mobile terminal and system based on digital watermarking
EP4338076A1 (en) A computerized charging/interface device with malware detection and backup capabilities
Barrera et al. Seeding a security-enhancing infrastructure for multi-market application ecosystems
WO2015081105A1 (en) Secure charger with malware scanner
CN113656762A (en) Method and device for managing third-party software
CN114298499A (en) Handheld terminal safety management system and method
CN116170808A (en) Trusted security protection method and system for mobile terminal and electronic equipment
CN117333187A (en) Palm brushing payment method and related device
CN117130640A (en) Firmware upgrading method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141001

RJ01 Rejection of invention patent application after publication